Sciweavers

3678 search results - page 241 / 736
» On the Stable Paths Problem
Sort
View
107
Voted
MVA
1994
15 years 6 months ago
A Fuzzy Reasoning Rule-Based System for Lace Pattern Detection
Lace is liable to stretch as it is passed through the feed mechanism, in which a vision system is engaged to detect the changes of the motif and find the cutting path (river) acro...
Nasser Sherkat, Chi-Hsien Victor Shih, Peter Thoma...
COMCOM
2006
79views more  COMCOM 2006»
15 years 5 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
CORR
2010
Springer
77views Education» more  CORR 2010»
15 years 4 months ago
Decreasing log data of multi-tier services for effective request tracing
Previous work shows request tracing systems help understand and debug the performance problems of multi-tier services. However, for large-scale data centers, more than hundreds of...
Bo Sang, Jianfeng Zhan, Guanhua Tian
ATMOS
2010
163views Optimization» more  ATMOS 2010»
15 years 4 months ago
Railway Track Allocation by Rapid Branching
The track allocation problem, also known as train routing problem or train timetabling problem, is to find a conflict-free set of train routes of maximum value in a railway netw...
Ralf Borndörfer, Thomas Schlechte, Steffen We...
168
Voted
INFOCOM
2007
IEEE
15 years 11 months ago
DEFT: Distributed Exponentially-Weighted Flow Splitting
— Network operators control the flow of traffic through their networks by adapting the configuration of the underlying routing protocols. For example, they tune the integer li...
Dahai Xu, Mung Chiang, Jennifer Rexford